Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,496 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A measurement study of the subresource integrity mechanism on real-world applications
Ronak Shah
,
Kailas Patil
Int. J. Secur. Networks
2018
Corpus ID: 51867732
Today, billions of websites are available to users in just a click to give them required and appropriate service. Most of these…
Expand
Review
2014
Review
2014
Turnover intention and employee engagement : exploring eliciting factors in South African audit firms
N. V. D. Westhuizen
2014
Corpus ID: 166811967
In response to globalisation and competition, today’s organisations are changing at an accelerating and radical pace. A review of…
Expand
2013
2013
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
Xi Xiong
,
Peng Liu
International Symposium on Recent Advances in…
2013
Corpus ID: 3965696
Untrusted kernel extensions remain one of the major threats to the security of commodity OS kernels. Current containment…
Expand
Review
2012
Review
2012
A KNOWLEDGE BASED APPROACH FOR THE GENERALIZATION OF LINEAR FEATURES
Andriani Skopeliti
,
L. Tsoulos
2012
Corpus ID: 10509178
Andriani Skopeliti 1 Lysandros Tsoulos 2 Cartography Laboratory, Faculty of Rural and Surveying Engineering National Technical…
Expand
2008
2008
Mechanisms to Provide Integrity in SCADA and PCS devices ∗
Aakash Shah
,
A. Perrig
,
B. Sinopoli
2008
Corpus ID: 14485275
Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure such as natura l gas, oil…
Expand
2007
2007
Microarchitectural Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors
Yunsi Fei
,
Z. Shi
Design, Automation & Test in Europe Conference…
2007
Corpus ID: 334260
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At…
Expand
2006
2006
Data and code integrity in Grid environments
R. Akimana
,
O. Markowitch
2006
Corpus ID: 13953596
In a large distributed system such as the Grid, ensuring data integrity is of particular importance. Since in a same network…
Expand
2005
2005
Hardware support for code integrity in embedded processors
M. Milenkovic
,
A. Milenković
,
E. Jovanov
International Conference on Compilers…
2005
Corpus ID: 2956777
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
1987
1987
Source code security: checklist for managers
Jon Corelis
SGSC
1987
Corpus ID: 52869049
Although computer security is usually thought of as data security, the protection of the executable software which creates and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE